Optimized and secure digital image watermarking technique using Henon mapping in redundant domain

被引:5
作者
Kumar, Chandan [1 ]
机构
[1] Career Point Univ Hamirpur, Dept CSE, Hamirpur, Himachal Prades, India
关键词
RDWT; Non-subsampled contourlet transform; MSVD; Arnold transform; Dragon fly optimization;
D O I
10.1007/s11042-024-18643-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, there is huge requirement of processed data that can be transmitted from one location to another. However data transmission over open channel faces various security related threats. So securing the data is first basic need for successful communication over unsecure channel. One of trusted method to secure the content is digital image watermarking. Digital watermarking secures the contents (audio, video and images) from unauthorized user by embedding secret information inside it. So, possible attacks can be detected by checking the degradation of embedded information. This work presents an optimized digital image watermarking solution using the Dragonfly optimization algorithm for an optimum scaling factor. It employs NSCT, RDWT, and MSVD transformations on the cover image, embedding watermarks in the appropriate band. Security is enhanced using the Henon Map encryption algorithm. Evaluation across diverse cover images demonstrates superior results in invisibility, security, robustness, and embedding capacity for copyright protection.
引用
收藏
页码:81151 / 81166
页数:16
相关论文
共 36 条
[1]   A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture [J].
Agarwal, Charu ;
Mishra, Anurag ;
Sharma, Arpita .
EGYPTIAN INFORMATICS JOURNAL, 2015, 16 (01) :83-102
[2]  
Agbedemnab PA., 2023, J Inf Secur, V14, P422
[3]   An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain [J].
Ali, Musrrat ;
Ahn, Chang Wook .
SIGNAL PROCESSING, 2014, 94 :545-556
[4]   A digital watermarking method based on NSCT transform and hybrid evolutionary algorithms with neural networks [J].
Amiri, Ali ;
Mirzakuchaki, Sattar .
SN APPLIED SCIENCES, 2020, 2 (10)
[5]   Digital Watermarking as an Adversarial Attack on Medical Image Analysis with Deep Learning [J].
Apostolidis, Kyriakos D. ;
Papakostas, George A. .
JOURNAL OF IMAGING, 2022, 8 (06)
[6]   Analysis of Digital Image Watermarking Techniques through Hybrid Methods [J].
Begum, Mahbuba ;
Uddin, Mohammad Shorif .
ADVANCES IN MULTIMEDIA, 2020, 2020
[7]   Digital Image Watermarking Techniques: A Review [J].
Begum, Mahbuba ;
Uddin, Mohammad Shorif .
INFORMATION, 2020, 11 (02)
[8]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[9]   A new robust reference watermarking scheme based on DWT-SVD [J].
Bhatnagar, Gaurav ;
Raman, Balasubramanian .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) :1002-1013
[10]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752